Cisco Catalyst 5000 series switches based on any of the following EARL
(Encoded Address Recognition Logic) hardware revisions:
and running any of the following switch software revisions:
4.5 (11) or earlier
5.5 (6) or earlier
6.1 (2) or earlier
are affected by this vulnerability. This series includes the Catalyst
models 5000, 5002, 5500, 5505, 5509, 2901, 2902 and 2926 switches.
To determine your hardware and software revision type sh
mod on the console prompt of the switch.
Additional information can be found in the document, "Identifying Catalyst 5000
EARL Version and Other Common EARL Questions."
Catalyst 5000 series switches based on EARL 2 or later hardware
revisions are not affected by this vulnerability.
Catalyst 5000 series switches regardless of the EARL hardware revision,
running the following switch software revisions
4.5 (12) or later - expected general availability before 2001, May
5.5 (7) or later
6.1 (3) or later
are not affected by this vulnerability.
No other Cisco product is currently known to be affected by this
vulnerability. This includes the Catalyst 6000, 4000, 3500XL, 2900XL and 2948G